Curriculum

  1. 1

    Book Preview

    1. Cloud Security Handbook for Architects Free preview
  2. 2

    Introduction

    1. (Included in full purchase)
  3. 3

    Section 1 : Overview and Need to Transform to Cloud Landscape

    1. (Included in full purchase)
  4. 4

    Chapter 1 : Evolution of Cloud Computing and its Impact on Security

    1. (Included in full purchase)
  5. 5

    Chapter 2 : Understanding the Core Principles of Cloud Security and its Importance

    1. (Included in full purchase)
  6. 6

    Chapter 3 : Cloud Landscape Assessment and Choosing a for Your Enterprise

    1. (Included in full purchase)
  7. 7

    Section 2 : Building Blocks of Cloud Security Framework and Adoption Path

    1. (Included in full purchase)
  8. 8

    Chapter 4 : Cloud Security Architecture and Implementation Framework

    1. (Included in full purchase)
  9. 9

    Chapter 5 : Native Cloud Security Controls and Building Blocks

    1. (Included in full purchase)
  10. 10

    Chapter 6 : Examine Regulatory Compliance and Adoption path for Cloud

    1. (Included in full purchase)
  11. 11

    Chapter 7 : Creating and Enforcing Effective Security Policies

    1. (Included in full purchase)
  12. 12

    Section 3 : Maturity Path

    1. (Included in full purchase)
  13. 13

    Chapter 8 : Leveraging Cloud-based Security Solutions Security-as-a-Service

    1. (Included in full purchase)
  14. 14

    Chapter 9 : Cloud Security Recommendations and Best Practices

    1. (Included in full purchase)
  15. 15

    Index

    1. (Included in full purchase)

About the course

Cloud platforms face unique security issues and opportunities because of their evolving designs and API-driven automation. We will learn cloud-specific strategies for securing platforms such as AWS, Microsoft Azure, Google Cloud Platform, Oracle Cloud Infrastructure, and others. The book will help you implement data asset management, identity and access management, network security, vulnerability management, incident response, and compliance in your cloud environment. This book helps cybersecurity teams strengthen their security posture by mitigating cyber risk when "targets" shift to the cloud. The book will assist you in identifying security issues and show you how to achieve best-in-class cloud security. It also includes new cybersecurity best practices for daily, weekly, and monthly processes that you can combine with your other daily IT and security operations to meet NIST criteria. This book teaches how to leverage cloud computing by addressing the shared responsibility paradigm required to meet PCI-DSS, ISO 27001/2, and other standards. It will help you choose the right cloud security stack for your ecosystem. Moving forward, we will discuss the architecture and framework, building blocks of native cloud security controls, adoption of required security compliance, and the right culture to adopt this new paradigm shift in the ecosystem. Towards the end, we will talk about the maturity path of cloud security, along with recommendations and best practices relating to some real-life experiences.

About the Author

Ashish Mishra is a seasoned IT professional and author who has more than 19 years of experience in the industry. He holds a strong grip and command of IT (Information Technology), IS (Information Security), and Cybersecurity domains. Ashish is also experienced in managing large IT and IS Operations, Strategy Building, Transformation Journey, Project and Program Management, and Service Delivery. His technical areas of expertise include but are not limited to Public Cloud, Private Cloud, Cloud Security, Network Security, SASE, and Zero Trust. With the thought process of “Continuous learning is the key to success”, he has obtained more than 100 professional certifications across various technologies and platforms related to Public and Private Cloud, Cloud Security, Information Security, Cybersecurity, Compliance, Infrastructure Management, Leadership, Project Management, and many more.